Skip to main content

Newsroom

Written by Guy Howard on .
A cyborg soldier controlled entirely by AI. A cybernetically enhanced human roaming the streets doing all kinds of jobs for money. These sound like plots out of a movie or video game. That’s because they are! But don’t let fiction fool you. These devel…
Written by Jared Schultz on .
It is always amazing to look back at old sci-fi movies and literature, getting glimpses of what the future may hold regarding technology. Whether it is the tv walls from Fahrenheit 451 or the communicators from Star Trek. So much of our technology toda…
Written by Jared Schultz on .
How to Keep Them Safe Online When I was a kid, about the only thing I had to worry about when using a computer was dying of dysentery while playing Oregon Trail. The threats that face computer users today, especially children who are not aware of cy…
Written by Jared Schultz on .
When a vulnerability hits 10 out of 10 on the Common Vulnerability Scoring System (CVSS), people pay attention and so should you. CVE-2020-1472 did just that–it hit a 10 and is dubbed the “perfect” exploit by Tara Seals, author at ThreatPost.com. Whil…